Organizational Cybersecurity Journal: Practice, Process and People: Volume 2 Issue 2 , Open Access


Table of contents

Toward enhancing the information base on costs of cyber incidents: implications from literature and a large-scale survey conducted in Germany

Bennet Simon von Skarczinski, Arne Dreißigacker, Frank Teuteberg

Literature repeatedly complains about the lack of empirical data on the costs of cyber incidents within organizations. Simultaneously, managers urgently require transparent and…

Are you listening? – an observational wake word privacy study

Marcia Combs, Casey Hazelwood, Randall Joyce

Digital voice assistants use wake word engines (WWEs) to monitor surrounding audio for detection of the voice assistant's name. There are two failed conditions for a WWE, false…


A closer look at organizational cybersecurity research trending topics and limitations

Allen C. Johnston

In identifying both the topics of interest and key limitations of the extant organizational security research, both opportunities for future research as well as some underlying…


The influence of ethical principles and policy awareness priming on university students’ judgements about ICT code of conduct compliance

Deborah Richards, Salma Banu Nazeer Khan, Paul Formosa, Sarah Bankins

To protect information and communication technology (ICT) infrastructure and resources against poor cyber hygiene behaviours, organisations commonly require internal users to…

Cover of Organizational Cybersecurity Journal: Practice, Process and People





Online date, start – end:


Journal’s owner:

Cybersecurity Management Council

Open Access:

open access


  • Dr Gurvirender Tejay